95 research outputs found

    Management of TinyML Enabled Internet of Things Devices

    Get PDF

    Not Just Efficiency: Insolvency Law in the EU and Its Political Dimension

    Get PDF
    Certain insolvency law rules, like creditors’ priorities and set-off rights, have a distributive impact on creditors. Distributional rules reflect the hierarchies of values and interests in each jurisdiction and, as a result, have high political relevance and pose an obstacle to reforming the EU Insolvency Regulation. This paper will show the difficulty of reform by addressing two alternative options to regulate cross-border insolvencies in the European Union. The first one is the ‘choice model’, under which companies can select the insolvency law they prefer. Although such a model would allow distressed firms to select the most efficient insolvency law, it would also displace Member States’ power to protect local constituencies. The choice model therefore produces negative externalities and raises legitimacy concerns. The opposite solution is full harmonisation of insolvency law at EU level, including distributional rules. Full harmonisation would have the advantage of internalising all externalities produced by cross-border insolvencies. However, the EU legislative process, which is still based on negotiations between states, is not apt to decide on distributive insolvency rules; additionally, if harmonisation includes such rules, it will indirectly modify national social security strategies and equilibria. This debate shows that the choice regarding power allocation over bankruptcies in the EU depends on the progress of European integration and is mainly a matter of political legitimacy, not only of efficiency

    Blind Password Registration for Two-Server Password Authenticated Key Exchange and Secret Sharing Protocols

    Get PDF
    Many organisations enforce policies on the length and formation of passwords to encourage selection of strong passwords and protect their multi-user systems. For Two-Server Password Authenticated Key Exchange (2PAKE) and Two-Server Password Authenticated Secret Sharing (2PASS) protocols, where the password chosen by the client is secretly shared between the two servers, the initial remote registration of policy-compliant passwords represents a major problem because none of the servers is supposed to know the password in clear. We solve this problem by introducing Two-Server Blind Password Registration (2BPR) protocols that can be executed between a client and the two servers as part of the remote registration procedure. 2BPR protocols guarantee that secret shares sent to the servers belong to a password that matches their combined password policy and that the plain password remains hidden from any attacker that is in control of at most one server. We propose a security model for 2BPR protocols capturing the requirements of policy compliance for client passwords and their blindness against the servers. Our model extends the adversarial setting of 2PAKE/2PASS protocols to the registration phase and hence closes the gap in the formal treatment of such protocols. We construct an efficient 2BPR protocol for ASCII-based password policies, prove its security in the standard model, give a proof of concept implementation, and discuss its performance

    Foraminiferal assemblages as palaeoenvironmental bioindicators in Late Jurassic epicontinental platforms: relation with trophic conditions

    Get PDF
    Foraminiferal assemblages from the neritic environment reveal the palaeoecological impact of nutrient types in relation to shore distance and sedimentary setting. Comparatively proximal siliciclastic settings from the Boreal Domain (Brora section, Eastern Scotland) were dominated by inner−shelf primary production in the water column or in sea bottom, while in relatively seawards mixed carbonate−siliciclastic settings from the Western Tethys (Prebetic, Southern Spain), nutrients mainly derived from the inner−shelf source. In both settings, benthic foraminiferal assemblages increased in diversity and proportion of epifauna from eutrophic to oligotrophic conditions. The proximal setting example (Brora Brick Clay Mb.) corresponds to Callovian offshore shelf deposits with a high primary productivity, bottom accumulation of organic matter, and a reduced sedimentation rate for siliciclastics. Eutrophic conditions favoured some infaunal foraminifera. Lately, inner shelf to shoreface transition areas (Fascally Siltstone Mb.), show higher sedimentation rates and turbidity, reducing euphotic−zone range depths and primary production, and then deposits with a lower organic matter content (high−mesotrophic conditions). This determined less agglutinated infaunal foraminifera content and increasing calcitic and aragonitic epifauna, and calcitic opportunists (i.e., Lenticulina). The comparatively distal setting of the Oxfordian example (Prebetic) corresponds to: (i) outer−shelf areas with lower nutrient input (relative oligotrophy) and organic matter accumulation on comparatively firmer substrates (lumpy lithofacies group) showing dominance of calcitic epifaunal foraminifera, and (ii) mid−shelf areas with a higher sedimentation rate and nutrient influx (low−mesotrophic conditions) favouring potentially deep infaunal foraminifers in comparatively unconsolidated and nutrient−rich substrates controlled by instable redox boundary (marl−limestone rhythmite lithofacies).This research was carried out with the financial support of projects CGL2005−06636−C0201 and CGL2005−01316/BTE, and University of Oslo, Norway−Statoil cooperation. M.R. holds a Juan de la Cierva grant from the Ministry of Science and Technology of Spain

    Beat-to-beat vectorcardiographic analysis of ventricular depolarization and repolarization in myocardial infarction

    Get PDF
    OBJECTIVES: Increased beat-to-beat variability in the QT interval has been associated with heart disease and mortality. The purpose of this study was to investigate the beat-to-beat spatial and temporal variations of ventricular depolarization and repolarization in vectorcardiogram (VCG) for characterising myocardial infarction (MI) patients. METHODS: Standard 12-lead ECGs of 84 MI patients (22 f, 63±12 yrs; 62 m, 56±10 yrs) and 69 healthy subjects (17 f, 42±18 yrs; 52 m, 40±13 yrs) were investigated. To extract the beat-to-beat QT intervals, a template-matching algorithm and the singular value decomposition method have been applied to synthesise the ECG data to VCG. Spatial and temporal variations in the QRS complex and T-wave loops were studied by investigating several descriptors (point-to-point distance variability, mean loop length, T-wave morphology dispersion, percentage of loop area, total cosine R-to-T). RESULTS: Point-to-point distance variability of QRS and T-loops (0.13±.04 vs. 0.10±0.04, p<0.0001 and 0.16±.07 vs. 0.13±.06, p<0.05) were significantly larger in the MI group than in the control group. The average T-wave morphology dispersion was significantly higher in the MI group than in the control group (62±8 vs. 38±16, p<.0001). Further, its beat-to-beat variability appeared significantly lower in the MI group than in the control group (12±5 v. 15±6u, p<0.005). Moreover, the average percentage of the T-loop area was found significantly lower in the MI group than the controls (46±17 vs. 55±15, p<.001). Finally, the average and beat-to-beat variability of total cosine R-to-T were not found statistically significant between both groups. CONCLUSIONS: Beat-to-beat assessment of VCG parameters may have diagnostic attributes that might help in identifying MI patients.Muhammad A. Hasan, Derek Abbott and Mathias Baumer

    LMS vs XMSS: Comparison of Stateful Hash-Based Signature Schemes on ARM Cortex-M4

    Get PDF
    Stateful hash-based signature schemes are among the most efficient approaches for post-quantum signature schemes. Although not suitable for general use, they may be suitable for some use cases on constrained devices. LMS and XMSS are hash-based signature schemes that are conjectured to be quantum secure. In this work, we compared multiple instantiations of both schemes on an ARM Cortex-M4. More precisely, we compared performance, stack consumption, and other figures for key generation, signing and verifying. To achieve this, we evaluated LMS and XMSS using optimised implementations of SHA-256, SHAKE256, Gimli-Hash, and different variants of Keccak. Furthermore, we present slightly optimised implementations of XMSS achieving speedups of up to 3.11x for key generation, 3.11x for signing, and 4.32x for verifying

    Acute graft versus host disease

    Get PDF
    Acute graft-versus-host disease (GVHD) occurs after allogeneic hematopoietic stem cell transplant and is a reaction of donor immune cells against host tissues. Activated donor T cells damage host epithelial cells after an inflammatory cascade that begins with the preparative regimen. About 35%–50% of hematopoietic stem cell transplant (HSCT) recipients will develop acute GVHD. The exact risk is dependent on the stem cell source, age of the patient, conditioning, and GVHD prophylaxis used. Given the number of transplants performed, we can expect about 5500 patients/year to develop acute GVHD. Patients can have involvement of three organs: skin (rash/dermatitis), liver (hepatitis/jaundice), and gastrointestinal tract (abdominal pain/diarrhea). One or more organs may be involved. GVHD is a clinical diagnosis that may be supported with appropriate biopsies. The reason to pursue a tissue biopsy is to help differentiate from other diagnoses which may mimic GVHD, such as viral infection (hepatitis, colitis) or drug reaction (causing skin rash). Acute GVHD is staged and graded (grade 0-IV) by the number and extent of organ involvement. Patients with grade III/IV acute GVHD tend to have a poor outcome. Generally the patient is treated by optimizing their immunosuppression and adding methylprednisolone. About 50% of patients will have a solid response to methylprednisolone. If patients progress after 3 days or are not improved after 7 days, they will get salvage (second-line) immunosuppressive therapy for which there is currently no standard-of-care. Well-organized clinical trials are imperative to better define second-line therapies for this disease. Additional management issues are attention to wound infections in skin GVHD and fluid/nutrition management in gastrointestinal GVHD. About 50% of patients with acute GVHD will eventually have manifestations of chronic GVHD

    Automated Unbounded Analysis of Cryptographic Constructions in the Generic Group Model

    Get PDF
    We develop a new method to automatically prove security statements in the Generic Group Model as they occur in actual papers. We start by defining (i) a general language to describe security definitions, (ii) a class of logical formulas that characterize how an adversary can win, and (iii) a translation from security definitions to such formulas. We prove a Master Theorem that relates the security of the construction to the existence of a solution for the associated logical formulas. Moreover, we define a constraint solving algorithm that proves the security of a construction by proving the absence of solutions. We implement our approach in a fully automated tool, the gga∞gga^{\infty} tool, and use it to verify different examples from the literature. The results improve on the tool by Barthe et al. (CRYPTO\u2714, PKC\u2715): for many constructions, gga∞gga^{\infty} succeeds in proving standard (unbounded) security, whereas Barthe\u27s tool is only able to prove security for a small number of oracle queries
    • …
    corecore